Improper Validation

chromium is vulnerable to improper validation. The vulnerability exists due to insufficient policy enforcement in File System API which allows an attacker to gain access to the system.Read More ...

Continue Reading
Path Traversal in XWiki Platform

### Impact One can ask for any file located in the classloader using the template API and a path with ".." in it. For example ``` {{template name="../xwiki.hbm.xml"/}} ``` To our knownledge none of t ...

Continue Reading
Weak private key generation in SSH.NET

During an **X25519** key exchange, the clientÂ’s private is generated with [**System.Random**](https://docs.microsoft.com/en-us/dotnet/api/system.random): ```cs var rnd = new Random(); _privateKey = n ...

Continue Reading
Security Updates for Microsoft Excel Products C2R (November 2021)

The Microsoft Excel Products are missing security updates. It is, therefore, affected by multiple vulnerabilities: - A security feature bypass vulnerability exists. An attacker can exploit this ...

Continue Reading
Security Updates for Microsoft Office Products C2R (November 2021)

The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities: - A security feature bypass vulnerability exists. An attacker can exploit this and ...

Continue Reading
Security Updates for Microsoft Visio Products C2R (March 2021)

The Microsoft Visio Products are missing a security update. It is, therefore, affected by the following vulnerability: - A security feature bypass vulnerability exists. An attacker can exploit t ...

Continue Reading
Security Updates for Microsoft Office Products C2R (March 2021)

The Microsoft Office Products are missing security updates. They are affected by a remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized a ...

Continue Reading
Security Updates for Microsoft PowerPoint Products C2R (March 2021)

The Microsoft PowerPoint Products are missing a security update. It is, therefore, affected by the following vulnerability: - A remote code execution vulnerability. An attacker can exploit this ...

Continue Reading

Back to Main

Subscribe for the latest news: